Source: NYT/Updated news.ca Not long after the uprising in Syria turned bloody, late in the spring of 2011, the Pentagon and the National Security Agency developed a battle plan that featured a sophisticated cyberattack...

Source: The Register Stuxnet – the famous worm widely credited with crippling the Iranian nuclear weapons programme for several years – also infected the internal network of a Russian nuclear plant. Unspecified malware...

Source: Guardian The armed forces should seek to make British involvement in future wars more palatable to the public by reducing the public profile of repatriation ceremonies for casualties, according to a Ministry...

Source: Jewish News As technology grows by leaps and bounds, leading thinkers gathered last week at the 2013 Israeli Presidential Conference to discuss the future of warfare. Israel’s cyber weapons will eventually replace...

Source: Defense News It was right around that time that scientists began to turn their attention to another project: trying to access these protected networks remotely, through the air, by reading activity via...

Source: AFR Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on...

Source: Telegraph The Jewish state is facing a dire shortage of “cyber-combat troops” and is scouring the Jewish Diaspora for exceptional, teenage computer minds to recruit to its cyber unit Intelligence Corps Unit...

Source: China Economic Review Imagine an attack on the US that poisoned water supplies, derailed trains and caused power outages across large swathes of the country. Such an offensive would likely require a...

Source: Al Arabiya/AFP Middle Eastern oil and gas companies have been targeted in massive attacks on their computer networks in an increasingly open cyber war where a new virus was discovered just this...

Source: Reuters Researchers have found evidence suggesting that the United States may have developed three previously unknown computer viruses for use in espionage operations or cyber warfare. The findings are likely to bolster...

Dubai: A new cyber surveillance virus, named Gauss, has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to Kaspersky Labs. “The virus is...

Source: Telegraph In the past five years, cyber and telecommunications defence has left its niche market to become one of the fastest growing industries in the world. In 2011, governments, industry and ordinary...

Source IB Times The active cyber-espionage campaign is targetting very specific victims including employees of critical infrastructure companies, financial services and government embassies, which are mainly located in Middle Eastern countries. So far...

Source: The Week Stuxnet and Flame, two of the key covert computer viruses used in OLYMPIC GAMES, were likely developed at Ft. Meade, Md. At NSA headquarters, computer scientists successfully weaponized C++ and...

Source: UPI Israel’s highly secretive Unit 8200 of Military Intelligence is increasingly seen to have played a leading role with the United States in developing a powerful new cyberweapon known as W32.Flame that...

Source: The Atlantic Israel’s officials have a message for anyone praising the CIA for its sophisticated cyber attack on Iran: It was our baby. The Stuxnet computer worm, described by David Sanger in The New...

The IDF uses cyber space to gather intelligence, attack enemies and conduct various military operations, the military revealed on Sunday in a posting on its official website. The rare announcement was the first...

Security researchers have linked the Flame virus to Israel while U.S. computer security experts say that it bears the hallmarks of the National Security Agency (NSA), according to reports from Nicole Perlroth of...

The previously unreported effort, which its authors have dubbed Plan X, marks a new phase in the nation’s fledgling military operations in cyberspace, which have focused more on protecting the Defense Departments’s own...

The news from cybersecurity researchers this Memorial Day sounded like a plot device from a science fiction movie. A hyper-secret surveillance program laid dormant on computers around the world for years, secretly turning...

Iran’s Ministry of Oil has cut off Internet accessto six oil refineries following an apparent cyber attack targeting their networks, it was widely reported on Monday. Representatives of the ministry said it has...

Source: Ars Technica The Stuxnet computer worm used to sabotage Iran’s nuclear program was planted by a double agent working for Israel. The agent used a booby-trapped memory stick to infect machines deep...

Source: Washington Post The Pentagon is planning to dramatically speed up the development of new cyberweapons, giving it the ability in some cases to field weapons against specific targets in a matter of...

Once entirely controlled by the U.S. National Security Agency (NSA), offensive cyber weapons are making their way into the hands of the U.S. military’s geographic combatant commanders. The effort was alluded to by...

A team of hackers from French security firm Vupen were playing by different rules. They declined to enter Google’s contest and instead dismantled Chrome’s security to win an HP-sponsored hackathon at the same...

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not connected to the Internet, according to current and former...